Journal of Computer Security最新文献

筛选
英文 中文
Secure authentication protocols to resist off-line attacks on authentication data table 安全认证协议,抵御对认证数据表的离线攻击
IF 1.2
Journal of Computer Security Pub Date : 2023-06-06 DOI: 10.3233/jcs-210171
Vinod Ramesh Falmari, B. M.
{"title":"Secure authentication protocols to resist off-line attacks on authentication data table","authors":"Vinod Ramesh Falmari, B. M.","doi":"10.3233/jcs-210171","DOIUrl":"https://doi.org/10.3233/jcs-210171","url":null,"abstract":"In text-based authentication, the passwords along with user names are maintained in the Authentication Data Table (ADT). It is necessary to preserve the privacy of passwords in ADT to avoid offline attacks like brute force attacks, lookup table attacks, etc. In this paper, three password protection schemes, namely Encrypted Image Password (EIP), Dynamic Authentication Data Table (D-ADT), and Extended Encrypted Image Password (EEIP) are proposed for secure authentication. In EIP, the input passwords are first converted to hashed passwords and then transformed into images. Next, these image passwords are encrypted using a novel image password encryption system using chaos functions and confusion-diffusion mechanisms. In D-ADT, the hashed passwords are encrypted using a random key. The major highlight of this scheme is that during every log, the hashed password is encrypted with a new random key while keeping the plain password same as it is. So, during each login of the user, the old encrypted password is replaced with a new encrypted password in the authentication data table. The EEIP scheme combines both approaches. Passwords are converted to images and image passwords are encrypted with the new random key at every login. Performance and security analysis are carried out for the proposed algorithm concerning correlation analysis, differential analysis, entropy analysis, computation time, keyspace, and offline attack analysis.","PeriodicalId":46074,"journal":{"name":"Journal of Computer Security","volume":"7 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2023-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79432754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A multiview clustering framework for detecting deceptive reviews 用于检测欺骗性评论的多视图聚类框架
IF 1.2
Journal of Computer Security Pub Date : 2023-03-13 DOI: 10.3233/jcs-220001
Yubao Zhang, Haining Wang, A. Stavrou
{"title":"A multiview clustering framework for detecting deceptive reviews","authors":"Yubao Zhang, Haining Wang, A. Stavrou","doi":"10.3233/jcs-220001","DOIUrl":"https://doi.org/10.3233/jcs-220001","url":null,"abstract":"Online reviews, which play a key role in the ecosystem of nowadays business, have been the primary source of consumer opinions. Due to their importance, professional review writing services are employed for paid reviews and even being exploited to conduct opinion spam. Posting deceptive reviews could mislead customers, yield significant benefits or losses to service vendors, and erode confidence in the entire online purchasing ecosystem. In this paper, we ferret out deceptive reviews originated from professional review writing services. We do so even when reviewers leverage a number of pseudonymous identities to avoid the detection. To unveil the pseudonymous identities associated with deceptive reviewers, we leverage the multiview clustering method. This enables us to characterize the writing style of reviewers (deceptive vs normal) and cluster the reviewers based on their writing style. Furthermore, we explore different neural network models to model the writing style of deceptive reviews. We select the best performing neural network to generate the representation of reviews. We validate the effectiveness of the multiview clustering framework using real-world Amazon review data under different experimental scenarios. Our results show that our approach outperforms previous research. We further demonstrate its superiority through a large-scale case study based on publicly available Amazon datasets.","PeriodicalId":46074,"journal":{"name":"Journal of Computer Security","volume":"78 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2023-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77597931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Discriminative spatial-temporal feature learning for modeling network intrusion detection systems 基于判别时空特征学习的网络入侵检测系统建模
IF 1.2
Journal of Computer Security Pub Date : 2023-02-27 DOI: 10.3233/jcs-220031
S. Wanjau, G. Wambugu, A. Oirere, G. M. Muketha
{"title":"Discriminative spatial-temporal feature learning for modeling network intrusion detection systems","authors":"S. Wanjau, G. Wambugu, A. Oirere, G. M. Muketha","doi":"10.3233/jcs-220031","DOIUrl":"https://doi.org/10.3233/jcs-220031","url":null,"abstract":"Increasing interest and advancement of internet and communication technologies have made network security rise as a vibrant research domain. Network intrusion detection systems (NIDSs) have developed as indispensable defense mechanisms in cybersecurity that are employed in discovery and prevention of malicious network activities. In the recent years, researchers have proposed deep learning approaches in the development of NIDSs owing to their ability to extract better representations from large corpus of data. In the literature, convolutional neural network architecture is extensively used for spatial feature learning, while the long short term memory networks are employed to learn temporal features. In this paper, a novel hybrid method that learn the discriminative spatial and temporal features from the network flow is proposed for detecting network intrusions. A two dimensional convolution neural network is proposed to intelligently extract the spatial characteristics whereas a bi-directional long short term memory is used to extract temporal features of network traffic data samples consequently, forming a deep hybrid neural network architecture for identification and classification of network intrusion samples. Extensive experimental evaluations were performed on two well-known benchmarks datasets: CIC-IDS 2017 and the NSL-KDD datasets. The proposed network model demonstrated state-of-the-art performance with experimental results showing that the accuracy and precision scores of the intrusion detection model are significantly better than those of other existing models. These results depicts the applicability of the proposed model in the spatial-temporal feature learning in network intrusion detection systems.","PeriodicalId":46074,"journal":{"name":"Journal of Computer Security","volume":"35 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2023-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81408505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
User Privacy Concerns in Commercial Smart Buildings1 商业智能楼宇中的用户隐私问题1
IF 1.2
Journal of Computer Security Pub Date : 2022-06-13 DOI: 10.3233/jcs-210035
Scott Harper, M. Mehrnezhad, John C. Mace
{"title":"User Privacy Concerns in Commercial Smart Buildings1","authors":"Scott Harper, M. Mehrnezhad, John C. Mace","doi":"10.3233/jcs-210035","DOIUrl":"https://doi.org/10.3233/jcs-210035","url":null,"abstract":"Smart buildings are socio-technical systems that bring together building systems, IoT technology and occupants. A multitude of embedded sensors continually collect and share building data on a large scale which is used to understand and streamline daily operations. Much of this data is highly influenced by the presence of building occupants and could be used to monitor and track their location and activities. The combination of open accessibility to smart building data and the rapid development and enforcement of data protection legislation such as the GDPR and CCPA make the privacy of smart building occupants a concern. Until now, little if any research exists on occupant privacy in work-based or commercial smart buildings. This paper addresses this gap by conducting two user studies ( N = 81 and N = 40) on privacy concerns and preferences about smart buildings. The first study explores the perception of the occupants of a state-of-the-art commercial smart building, and the latter reflects on the concerns and preferences of a more general user group who do not use this building. Our results show that the majority of the participants are not familiar with the types of data being collected, that it is subtly related to them (only 19.75% of smart building residents (occupants) and 7.5% non-residents), nor the privacy risks associated with it. After being informed more about smart buildings and the data they collect, over half of our participants said that they would be concerned with how occupancy data is used. These findings show that despite the more public environment, there are similar levels of privacy concerns for some sensors to those living in smart homes. The participants called for more transparency in the data collection process and beyond, which means that better policies and regulations should be in place for smart building data.","PeriodicalId":46074,"journal":{"name":"Journal of Computer Security","volume":"12 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2022-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72766267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Study on the Types of Using Digital Services by Elderly Consumers: Focused on Internet Users 老年消费者使用数字服务类型研究:以互联网用户为研究对象
IF 1.2
Journal of Computer Security Pub Date : 2021-04-30 DOI: 10.35736/JCS.32.2.2
Jin-Myong Lee, Suyeon Kim, Ji H Baek, Jae-Sik Yang, J. Lim, Hyejin Jang
{"title":"A Study on the Types of Using Digital Services by Elderly Consumers: Focused on Internet Users","authors":"Jin-Myong Lee, Suyeon Kim, Ji H Baek, Jae-Sik Yang, J. Lim, Hyejin Jang","doi":"10.35736/JCS.32.2.2","DOIUrl":"https://doi.org/10.35736/JCS.32.2.2","url":null,"abstract":"","PeriodicalId":46074,"journal":{"name":"Journal of Computer Security","volume":"32 1","pages":"23-45"},"PeriodicalIF":1.2,"publicationDate":"2021-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85258301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Role of Trust in C2C Platforms 信任在C2C平台中的作用
IF 1.2
Journal of Computer Security Pub Date : 2021-04-30 DOI: 10.35736/JCS.32.2.4
B. Lee
{"title":"The Role of Trust in C2C Platforms","authors":"B. Lee","doi":"10.35736/JCS.32.2.4","DOIUrl":"https://doi.org/10.35736/JCS.32.2.4","url":null,"abstract":"","PeriodicalId":46074,"journal":{"name":"Journal of Computer Security","volume":"17 1","pages":"73-100"},"PeriodicalIF":1.2,"publicationDate":"2021-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73783165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on the Types of Consumer Information Activity: Focused on Food Delivery Service App Reviews 消费者信息活动类型研究——以外卖服务App评论为例
IF 1.2
Journal of Computer Security Pub Date : 2021-04-30 DOI: 10.35736/JCS.32.2.5
S. Kim, Hye-Gyoung Koo
{"title":"A Study on the Types of Consumer Information Activity: Focused on Food Delivery Service App Reviews","authors":"S. Kim, Hye-Gyoung Koo","doi":"10.35736/JCS.32.2.5","DOIUrl":"https://doi.org/10.35736/JCS.32.2.5","url":null,"abstract":"","PeriodicalId":46074,"journal":{"name":"Journal of Computer Security","volume":"61 1","pages":"101-123"},"PeriodicalIF":1.2,"publicationDate":"2021-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85570699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Consumer Typology Based on Network Externalities: Artificial Intelligence Speakers 基于网络外部性的消费者类型学:人工智能音箱
IF 1.2
Journal of Computer Security Pub Date : 2021-04-30 DOI: 10.35736/JCS.32.2.1
H. Kim, Jin-Myong Lee
{"title":"A Consumer Typology Based on Network Externalities: Artificial Intelligence Speakers","authors":"H. Kim, Jin-Myong Lee","doi":"10.35736/JCS.32.2.1","DOIUrl":"https://doi.org/10.35736/JCS.32.2.1","url":null,"abstract":"","PeriodicalId":46074,"journal":{"name":"Journal of Computer Security","volume":"13 1","pages":"1-22"},"PeriodicalIF":1.2,"publicationDate":"2021-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84864283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Color Makes You Think Differently: The Impact of Change in Saturation on Thinking Style through Dynamic Feeling 色彩让你的思维方式不同:饱和度变化对动态感觉思维方式的影响
IF 1.2
Journal of Computer Security Pub Date : 2021-04-30 DOI: 10.35736/JCS.32.2.3
H. Cho, Wooseong Kang
{"title":"Color Makes You Think Differently: The Impact of Change in Saturation on Thinking Style through Dynamic Feeling","authors":"H. Cho, Wooseong Kang","doi":"10.35736/JCS.32.2.3","DOIUrl":"https://doi.org/10.35736/JCS.32.2.3","url":null,"abstract":"","PeriodicalId":46074,"journal":{"name":"Journal of Computer Security","volume":"7 1","pages":"47-71"},"PeriodicalIF":1.2,"publicationDate":"2021-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78677251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cross-Indigenous Pembelajara Sejarah Dalam Mengajarkan Nilai-Nilai Multikulturalisme Pada Peserta Didik 在教授多元文化主义价值观方面,历史上不可否认的障碍
IF 1.2
Journal of Computer Security Pub Date : 2021-04-21 DOI: 10.23887/JCS.V3I1.33920
Ketut Sedana Arta
{"title":"Cross-Indigenous Pembelajara Sejarah Dalam Mengajarkan Nilai-Nilai Multikulturalisme Pada Peserta Didik","authors":"Ketut Sedana Arta","doi":"10.23887/JCS.V3I1.33920","DOIUrl":"https://doi.org/10.23887/JCS.V3I1.33920","url":null,"abstract":"Tulisan ini bertujuan untuk menganalisis pendidikan sejarah mengalami perkembangan dewasa ini yang dapat dilihat dari aspek konten maupun pedagogiknya, salah satunya dapat ditelaah dalam pembelajaran sejarah. Pendekatan cross-indigeneus mempunya focus kajian masyarakat mendasatkan pada lingkungan native culture, yang pada tulisan ini berusaha mengaplikasikan cross-indigeneus sebagai pendekatan pembelajaran sejarah dalam penanaman pemahaman budaya. bagaimana memahami kurikulum sejarah dalam Pendidikan multicultural sehingga siswa memiliki pemahaman universalitas lintas budaya. Metode yang digunakan adalah kajian Pustaka yang menggunakan beberapa referensi tentang pembelajaran sejarah berbasis cross-indigeneus. Hasil kajian mengungkapkan bahwa Pendidikan sejarah bisa ikut berperan dalam rangka mendukung tujuan yang ingin dicapai dalam Pendidikan multicultural tersebut, mengingat relevansi pendidikan sejarah dengan berbagai apek kehidupan berbangsapengembangan komponen-komponen kurikulum sejarah itu sendiri.Pembelajaran sejarah dengan pendekatan cross-indigeneus bisa memberikan wawasan baru. Ilustrasi sederhana dari konsep ini, misalnya suatu tema sejarah lokal bisa dikaji dengan bantuan ilmu-ilmu sosial misalnya dikaji dari aspek ekonomi, sosiologi, antropologi, geografi, psikologi.","PeriodicalId":46074,"journal":{"name":"Journal of Computer Security","volume":"40 1","pages":"17"},"PeriodicalIF":1.2,"publicationDate":"2021-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79874291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信